Language Selection

English French German Italian Portuguese Spanish

Standing Up to Hurricane Ike. . . with Linux, of Course

Filed under

As some of us at Linux Journal clean our yards of debris, repair our broken windows, and make do with spotty internet access, power outages, and grocery shortages, we thought we'd share a story about the silver lining in the reality that is big, bad hurricane Ike.

All of us at Linux Journal's Houston office are just fine, and we have found ways to stay in touch with each other and our community. We have used whatever technology is available to us to exchange information and coordinate our efforts. Tools like SMS messaging, twitter, and web-enabled phones make post-hurricane clean-up and efforts to return to normal so much easier than they have ever been in the past.

One online hub of information has proven essential to Houstonians and the rest of the world to stay informed about evacuations, power restoration procedures, photo galleries detailing damage, and much more related to getting past a disaster of this magnitude. Our local newspaper, the Houston Chronicle, has a pretty fantastic online edition that has handled this all gracefully, and kept us all as sane as possible during the whole ordeal.

More Here

More in Tux Machines

FOSS Security

  • European Parliament votes to extend Free Software security audits
    Remember how I raised €1 million to demonstrate security and freedom aren’t opposites? Well here’s what happened next and how we are going to move forward with this. In 2014, two major security vulnerabilities, Heartbleed and Shellshock, were discovered. Both concerned Free Software projects that are widely used throughout the Internet, on computers, tablets, and smartphones alike. My colleague Max Andersson from the Swedish Greens and I proposed a so-called “pilot project”, the Free and Open Source Software Audit (FOSSA).
  • Princeton Upskills U on Open Source Security
    During Wednesday's Upskill U course, lecturer Gary Sockrider, principal security technologist for Arbor Networks , explained the history of DDoS attacks, case studies of recent attacks, and the business impact of these security threats. DDoS attacks not only raise operational expenses, but can also negatively affect an organization's brand, and result in loss of revenue and customers. (Listen to Security: Tackling DDoS.) "Having visibility is key, you can't stop something you can't see. Having good visibility across your own network is vital in finding and stopping these attacks," said Sockrider. "You can leverage common tools and technology that are already available on the network equipment you own today such as flow technologies, looking at SIP logs … Obviously you'll want to get to some specific intelligent DDoS mitigation in the end."

Android Leftovers

Linux Mint 18.1 Slated to Launch Later This Year, Will Be Codenamed “Serena”

Just a few minutes ago, Linux Mint project leader Clement Lefebvre announced the codename of the next Linux Mint release, versioned 18.1, along with a bit of information regarding its release date and upgrade possibility from previous versions. Read more

Ubuntu 17.04 "Zesty Zapus" Now Tracks Linux Kernel 4.9, Could Ship Kernel 4.10

On October 27, 2016, Joseph Salisbury from the Ubuntu Kernel Team has published yet another newsletter to keep Ubuntu Linux users in the loop with what Canonical is planning for the upcoming Ubuntu 17.04 operating system. Read more